Access News, Articles and Updates

While 2FA is being implemented more often and users are more frequently protecting their accounts, we need to see these numbers double or triple what we see today for us to be confident that the internet is safer.

While Russian-affiliated actors who took aim at US state election systems and the US voting process likely didn't change votes, in a few states they were able to access US voter registration databases.

Web trackers like Bandsintown are exploiting the "Login with Facebook" feature to gain access to data from the social media firm's users, according a report by security researchers at the Freedom to Tinker blog.

Gwent Police failed to inform up to 450 people that hackers may have accessed their confidential information after it found that an online tool that allowed citizens to report incidents to the Police was exposed to hackers.

Does the US' FBI really need tech companies to provide backdoors in their products to gain access to illegal material stored there? Apparently not...as long as members of the Geek Squad are willing to do the agency's bidding.

Millennials use passwords less than others and as they come to dominate the workforce, their online authentication habits impact the way employers and technology companies provide access to devices and applications.

IT and security leaders must elevate IAM out of the realm of IT, via a programme management approach, so it becomes a business-wide initiative; IAM leaders need to assert themselves in digital transformation initiatives.

Multiple Chase Bank customer accounts in the US were exposed after what was described as a "glitch" granted customers looking to log into their own accounts access to the accounts of random customers instead.

Drupal patched multiple vulnerabilities in both Drupal 7 and Drupal 8 including a comment reply form flaw that allows access to restricted content and an incomplete JavaScript cross-site scripting prevention flaw, both rated critical.

The four main breaches of 2017 had various things in common. No matter how sophisticated the attack, they could all have been avoided. Whether due to a lack of interest, focus, urgency or all three, bad decisions were the key culprit.

It's vital that multi-factor authentication systems become the industry standard for securing both customer and internal IT accounts. By replacing the outdated password-username combination, most hackers are outfoxed.

The essence of IAM (identity and access management) is ensuring that the right people, have the right access, to the right resources, in the right ways, and that you can prove all those "rights" to the people that need to know.

Relying on usernames and passwords to authenticate user identity is irresponsible. If one of your tweaked passwords is lost or stolen, you should throw all versions of it away as hackers know that people tweak passwords.

Yesterday large parts of the world were without their LinkedIn accounts due to an SSL certificate expiry and those that were able to login were browsing without encryption, meaning all of their data was potentially at risk.

Rémy Cointreau faced a challenge to create a more agile organisation through its IT infrastructure, providing employees with the ability to securely access applications from any device at any time and from anywhere.

SC Media UK arms cyber-security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.